LevelOne FCS-3051, FCS-3031 User Manual

Page 1
Network Camera
FCS-3031
PoE PIR IP Dome Camera
FCS-3051
Day/Night PoE PIR IP Dome Camera
V1.0.0
Page 2
ii
Safety
FCC
This equipment has been tested and found to comply with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference (2) This device must accept any interference received, including interference that may
cause undesired operation.
CE
This equipment is in compliance with the requirements of the following regulations: EN 55 022: CLASS B
RoHS
This product is RoHS compliant.
Page 3
i
Table of Contents
CHAPTER 1 INTRODUCTION.............................................................................................. 1
Overview ............................................................................................................................ 1
Physical Details .................................................................................................................. 4
Package Contents .............................................................................................................. 5
CHAPTER 2 BASIC SETUP ................................................................................................... 6
System Requirements ........................................................................................................ 6
Installation ......................................................................................................................... 6
Setup using the Camera Wizard ...................................................................................... 7
CHAPTER 3 VIEWING LIVE VIDEO ................................................................................ 12
Overview .......................................................................................................................... 12
Requirements ................................................................................................................... 12
Connecting to a Camera on your LAN .......................................................................... 12
Connecting to a Camera via the Internet ...................................................................... 14
Viewing Live Video ......................................................................................................... 16
CHAPTER 4 ADVANCED VIEWING SETUP ................................................................... 18
Introduction ..................................................................................................................... 18
Adjusting the Video Image ............................................................................................. 18
Viewing the live Video on your cell phone..................................................................... 21
Controlling User Access to the Video Stream ............................................................... 23
Making Video available from the Internet .................................................................... 24
Viewing Live Video via the Internet .............................................................................. 27
Motion Detection Alerts .................................................................................................. 28
CHAPTER 5 WEB-BASED MANAGEMENT .................................................................... 30
Introduction ..................................................................................................................... 30
Connecting to Network Camera ..................................................................................... 30
Welcome Screen ............................................................................................................... 31
Administration Menu ...................................................................................................... 32
System Screen .................................................................................................................. 33
Network Screen................................................................................................................ 35
DDNS Screen.................................................................................................................... 38
IP Filter ............................................................................................................................ 40
I/O Port............................................................................................................................. 41
Video & Audio Screen ..................................................................................................... 42
Video Access Screen ........................................................................................................ 45
User Database Screen ...................................................................................................... 47
Motion Detection Screen ................................................................................................. 48
E-Mail Screen .................................................................................................................. 49
FTP Screen ....................................................................................................................... 51
HTTP Screen.................................................................................................................... 52
SMB Client Screen .......................................................................................................... 53
Event Trigger Screen ...................................................................................................... 54
Maintenance Screen ........................................................................................................ 56
Status Screen .................................................................................................................... 58
Log Screen ........................................................................................................................ 60
CHAPTER 7 TROUBLESHOOTING .................................................................................. 61
Overview .......................................................................................................................... 61
Problems ........................................................................................................................... 61
Page 4
ii
APPENDIX A SPECIFICATIONS ........................................................................................ 63
FCS-3031/3051 ................................................................................................................. 63
Regulatory Approvals ..................................................................................................... 64
Copyright Notice .............................................................................................................. 65
APPENDIX B STREAMING VIDEO/AUDIO SOLUTION ............................................... 80
Overview .......................................................................................................................... 80
Streaming Video/Audio through Internet Camera....................................................... 80
Page 5
1
Chapter 1
Introduction
This Chapter provides features of LevelOne Network Camera, FCS-3031 and FCS-3051 in detail with its components and capabilities.
Please be noted that all the captured images in the following chapters are based on Windows XP by using FCS-3051 Network Camera.
Overview
The FCS-3031/FCS-3051 has an Integrated Microcomputer and a high quality CMOS digital­Image-Senso r, enabli ng it to display high quality live streaming video over your wired LAN.
Using enha nced MPEG -4 technologies, the FCS-3031/FCS-3051 is able to stream high quality video and audio directly to your PC. The high compression capabilities of MPEG-4 reduce network bandwidth re quirements to amazingly low levels.
With built-in PIR sensor and IR LEDs, FCS-3051 can provide home security and illumination around 5 meters long under low light conditions in a simple, economical manner.
A convenient and user-friendly surveillance software, IP CamSecure Lite, which provided for both viewing and recording video. If necessary, you can even view video using your W eb Browser, on a variety of software platforms.
Figure 1: Network Camera
Features
Dual Video Support. FCS-3031/3051 can support both MEPG4 and MJEPG video for
different image compression.
1
Page 6
2
Stream Live Video to Multiple Users. The MPEG4 encoder and HTTP server built
into the camera generate a ready-to-view video stream. Just connect to the camera using your Web browser or the provided Windows utility to view live video.
Suitable for Home, Business or Public Facilities. Whether for Home, Business o r
Public Facility surveillance, or just for entertainment and fun, FCS-3031/3051 has the features you need.
Multi-Protocol Support. Supporti ng TCP/IP networking, S MTP (E-mail), HTTP and
other Internet related protocols, FCS-3031/3051 can be easily integrated into your existing network.
Easy Configuration. A Windows-based Wizard is provided for initial setup.
Subsequent administration and management can be performed using a standard web browser. The administrator can configure and manage FCS-3031/3051 via the LAN or Internet.
Viewing/Recording Utility. A user-frie nd ly Windows utility is provided for viewing
live video. For periods when you are absent, or for scheduled recording, this application also allows you to record video to an ASF file on your PC. The recorded files are in a standard Windows Media format, and thus usable by a wide variety of programs if required.
Motion Detection. This feature can detect motion in the field of view. FCS-3031/3051
will compare consecutive frames to detect changes caused by the movement of large objects. This function only wo rks indoors due to the sensitivity of the CMOS sensor. When motion is detection, an E-mail alert can be sent, or some other action may be triggered.
Flexible Scheduling. You can limit access to the video stream to specified times using
a flexible scheduling system. The Motion Detection feature can also have its own schedule, so it is active only whe n required.
Syslog Support. If you have a Syslog Server, FCS-3031/3051 can send its log data to
your Syslog Server.
Audio Support. You can listen as well as look! Audio is encoded with the video if
desired. You can connect to an external microphone.
PIR (Passive Infrared Sensor) Support. FCS-3031/3051 is embedded with a PIR
Sensor, which senses infrared lig ht ra diating from human bodies in it s field of view. This feature is very helpfu l in enhancing home sec urity systems.
IR LEDs Support (FCS-3051 Only). FCS-3051 has 11 IR LEDs. The LEDs can
provide illumination around 5 meters long, that can help to output a b e tte r video quality while under low-light c onditions such as indoors, on cloudy days, or in the morning or evening.
PoE Support. You can use PoE (Power over Ethernet) to provide power to the FCS-
3031/3051, so only a single cable connection is required.
Internet Features
User-definable HTTP port number. This allows Internet Gateways to use "port
mapping" so the FCS-3031/3051 and a Web Server can share the same Internet IP address.
SMB Client Support. With Server Message Block Protocol (SMB protocol) support, the
client applications in a computer can read, create, and update files on the remote server.
DDNS Support. In order to view video over the Internet, users must know the Inter net
IP addres s of the gateway used by the FCS-3031/3051. But if the Gateway has a dynamic IP address, DDNS (Dynamic DNS) is required. Since many existing Gateways do not support DDNS, this function is inco rporated into the FCS-3031/3051.
Page 7
3
NTP (Network-Time-Protocol) Support. NTP allows the FCS-3031/3051 to calibrate
its internal clock from an Internet Time-Server. This ensures that the ti me stamp on Video from the FCS-3031/3051 will be correct.
Security Features
User Authentication. If desired, access to live video can be restricted to known users.
Users will have to enter their username and password before being able to view the video stream. Up to 10 users can be entered.
Password-Protected Configuration. Configuration data can be password protected, so
that it only can be changed by the Administrator.
Page 8
4
Physical Details
Front
IR LEDs (FCS-3051 Only)
These IR LED s are designed for the supply of ba cklighting while under the low-light environments.
Light Sensor
The light sensor can be used to distinguish between light and dark, as well as determine the intensity of the light.
Lens
(FCS-3031) Use board mount lens. You should ensure t hat the lens cover remain clean. The image quality is degraded if the lens cover is dirty or smudged.
(FCS-3051) Use the zoom and focus puller to adjust the image of the lens. You should ensure that t he lens cover remain clean. The image quality is degraded if the lens cover is dirty or smudged.
Power LED (Green)
On - Power on. Off - No power. Blinking - The Power LED will blink during start up . This will take
15 to 20 seconds.
PIR Sensor
The PIR sensor is designed for human body detection.
Rear
Power Input
Connect the supplied 12V power adapter here. Do not use other power adapters; doing so may damage the camera.
LAN port
Use a standard LAN cable to connect your Network Camera to a 10/100BaseT hub or switch.
Digital Input/Output
The GPIO terminal block includes 1 input port and 1 output port.
Reset Button
This button is recessed; you need a pin or paper clip can be used to depress it. It can be activated at any time the camera is in the "ready" mode.
Reset to manufacturer default valued and reboot. When
pressed and held over 10 seconds, the settings of Network Camera will be set to their default values.
Note:
After this procedure is comple te d, all LEDs will blink three times to confirm that the reset was completed successfully.
AV
Connect the supplied AV cabl e to the AV port, which will extend TV out, mic in, and spk out connections.
Page 9
5
Package Contents
The following items should be included: If any of these items are damaged or missing, please contact your dealer immediately.
1. FCS-3031 or FCS-3051
2. Power Adapter
3. CD Manual/Utility
4. Quick Installation Guide
5. Allen Wrench
Figure 2: AV Cable
Page 10
6
Chapter 2
Basic Setup
This Chapter provides details of installing and configuring the FCS­3031/3051.
System Requirements
To use the wired LAN interface, a standard 10/100BaseT hub or switch and network cable is required.
Installation
1. Assemble the Camera
Mount the Ne twork Camera if required.
2. Connect the LAN Cable
Connect the Network Camera to a 10/100BaseT hub or switch, using a standard LAN cable.
The first time you connect to the camera, you should connect the LAN cable and configure the Network Cam era with appropriate settings.
3. Power Up
Connect the supplied 12V power adapter to the Network Camera and power up. Use only the power adapter provided. Using a different one may cause hardware damage.
4. Check the LEDs
The Power LED will turn on briefly, then start blinki ng. It will blink during startup, which takes 15 to 20 seconds. After startup is completed, the Power LED should remain ON.
For more information, refer to Physical Details in Chapt er 1.
Using PoE
The FCS-3031/3051 supports PoE (Power over Ethernet). To use PoE:
1. Do not connect the supplied power adapter to the FCS-3031/3051.
2. Connect one end of a standard (category 5) LAN cable to the Ethernet port on the FCS-
3031/3051.
3. Connect the other end of the LAN cable to the powered Ethernet port on a suitable PoE
Adapter.
4. Connect the unpowered Ethernet port on the PoE adapter to your Hub or switch.
5. Connect the power supply to the PoE adapter and power up.
2
Page 11
7
Setup using the Camera Wizard
Initial setup should be performed using the supplied Windows-based Camera Wizard. This program can locate the Network Camera even if its IP address is invalid for your network. You can then configure the FCS-3031/3051 with appropriate TCP/IP settings for your LAN.
Subsequent administration can be performed with your Web browser, as explained in Chapter 5 - Web-based Management.
Setup Procedure
1. Insert the supplied CD-ROM into your drive. If the setup program does not start
automatically, run Autorun.exe in the root folder.
You will see the Welcome screen shown below.
Click the Camera Wizard button to start the setup Wizard
Figure 3: Welcome Screen
Page 12
8
2. The next screen, shown below, will list all the Network Cameras on your LAN.
Figure 4: Camera List Screen
Select the desired Camera from the list on the left. The current settings for the selected
Camera will be displayed in the ta ble on the right.
Click Next
to continue.
3. You will be prompted to enter the Administrator Name and Administrator Password, a s
shown below.
If using the defaul t values, enter administrator for the name, and leave the
password blank.
Otherwise, enter the Administrator Name and Administrator Password set on the
Maintenance screen.
Figure 5: Password Dialog
Page 13
9
4. This screen allows you to enter a suitable Description, and set the correct Time Zo n e ,
Date, and Time. Make any desired changes, then click Next
to continue.
Figure 6: Camera Settings
5. On the following IP Addre ss Sett ings screen, sho wn below, choose Fixed IP Address or
Dynamic IP Address.
Figure 7: Fixed or Dynamic IP Selection
Fixed IP Address is recommended, and can always be used.
Dynamic IP Address can only be used if your LAN has a DCHP Server.
Click Next
to continue.
Page 14
10
6. If you chose Fixed IP Address, the fo llowing TCP/IP Settings screen will be displayed.
Figure 8: TCP/IP Settings
Enter an unused IP Address fr om within the address r ange used on your LAN.
The Subnet Mask and Default Gateway fields must match the values us ed by PCs on
your LAN.
The Primary DNS address is required in order to use the E-mail alert or Dynamic
DNS features. Enter the DNS (Domain Name Server) address recommended by your ISP.
The Secondary DNS is optional. If pr ovided, it will be used if the Pri mary DNS is
unavailable.
Click Next
to continue.
7. The next screen, shown belo w, d isp la ys all d e ta ils of the FCS-3031/3051.
Click Next
if the settings are correct
Click Back
to modify any incorrect values.
Figure 9: Save Settings
Page 15
11
8. Click OK to confir m that yo u wa nt to save the ne w set ti ngs . I f you wa nt to ca nce l your
changes, click Cancel.
Figure 10: Confirm Screen
9. After clicking OK, you will see the screen below.
Figure 11: Final Screen
10. Click OK to end the Wizard.
Setup is now complete.
Page 16
12
Chapter 3
Viewing Live Video
This Chapter provides basic information about viewing live video.
Overview
After finishing set up via the Camera Wiz a rd, all LAN users can view live video using Internet Explorer on Windows.
This Chapter has detai ls of viewing live video using Inte rnet Explorer. But many other powerful features and options are available:
To view multiple cameras simultaneously, or record video (either interactively or by
schedule), you should install the IP CamSecure Lite. Refer to the user’s manual in the software CD for details on installing and using this program.
The camera administrator can also adjust the Video Stream, and restrict access to the video
stream to known users by requiring viewers to supply a username and password. See Chapter 4 - Advanced Viewing Setup for details.
To make Live Video from the camera available via the Internet, your Internet Gateway or
Router must be configured correctly. See Making Video available from the Internet in Chapter 4 - Advanced Viewing Setup for details.
Requirements
To view the live video stream generated by the FCS-3031/3051, you need to meet the following requirements:
Windows 2000, Windows XP or Windows Vista.
Internet Explorer 6 or later.
Connecting to a Camera on your LAN
To establish a connection from your PC to the FCS-3031/3051:
1. Use the Camera Wizard to get the IP address of the Network Camera.
2. Start Internet Explorer.
3. In the Address box, enter "HTTP://" and the IP Address of the FCS-3031/FCS-3051.
4. When you connect, the following screen will be displayed.
3
Page 17
13
Figure 12: Home Screen
5. Click View Video.
6. If the Administrator has restricted access to known users, you will then be prompted for a
username and password. Enter the name and password assigned to you by the administrator.
7. The first time you connect to the camera, you will be prompted to install an Ac tiveX
component (OCX or CAB file), a s in the example below.
You must install this ActiveX component (OCX or CAB file) in order to view the Video stream in Internet Explorer. Click the "Yes" button to install the ActiveX component.
Figure 13: ActiveX OCX Prompt
8. Video will start playing automatically. There may be a delay of a few seconds while the
video stream is buffered.
Page 18
14
Connecting to a Camera via the Int er ne t
You can NOT connect to a camera via the Internet unless the camera Administrator has configured bo th th e camera and the Internet Gateway/Router used by the camera.
See Making Video available from the Internet in Chapter 4 - Advanced Viewing Setup for details of the required configuration.
Also, you need a broadband Internet connection to view video effectively. Dial-up connections are NOT supported.
To establish a connection from your PC to the FCS-3031/3051 via the Inter net:
1. Obtain the following information from the Administrator of the camera you wish to
connect to:
Internet IP Address or Domain Name of the camera.
Port number for HTTP connections.
Login (username, password) if required.
2. Start Internet Explorer.
3. In the Address box, enter the foll owing:
HTTP://Internet_Address:port_number Where Internet_Address is the Internet IP address or Domain Name of the camera,
and port_number is the port number used for HTTP (Web) connections to the camera.
Examples using an IP address:
HTTP://203.70.212.52:1024 Where the Internet IP address is 203.70.212.52 and the HTTP port number is 1024.
Example using a Domain Name:
HTTP://mycamera.dyndns.tv:1024
Where the Domain name (using DDNS in this example) is mycamera.dyndns.tv and the HTTP port number is 1024.
Page 19
15
4. When you co nnect, the following screen will be displayed.
Figure 14: Home Screen
5. Click View Video.
6. If the Administrator has restricted access to known users, you will then be prompted for a
username and password. Enter the name and password assi gned to you by the administr a tor.
7. The first time you connect to the camera, you will be prompted to install an Ac tiveX
component (OCX or CAB file), a s in the example below.
You must install this ActiveX component (OCX or CAB file) in order to view the Video stream in Internet Explorer. Click the "Yes" button to install the ActiveX component.
Figure 15: ActiveX OCX Prompt
8. Video will start playing automatically. There may be a delay of a few seconds while the
video stream is buffered.
Page 20
16
Viewing Live Video
After installing the ActiveX c omponent, you will be able to view the live video stream in its own window, a s shown belo w.
Figure 16: View Video Screen
There are a number of options available on this screen, accessed by select list, button or icon. See the table below for details.
Note: The opti ons can only be configured while using IE browser. Other browsers can just view the video rather than configuration.
General Options
These options are always available, regardless of the type of camera you are connected to.
Resolution. Use this drop-down list to select the desired video size. Zoom. A digital zoom feature is availa ble. To zoom in on a section of the
window, cl i ck this ico n. Then use your mouse t o select the section you want to magnify. Click the icon again to disable the zoom feature.
Snapshot. Click this button t o take a single JPEG "snapshot" image of the current vide o.
Flip. Click this button to have the image swapped top-to-bottom.
Mirror. Click this button to have the image swappe d left-to-right.
Audio On. This icon is displa yed if audio is On. Click on the icon to turn
audio Off. Volume. If audio is enab le d, use this slider to adjust the volume.
Page 21
17
Setup. Select the desired video format from the drop-down list.
ON. Click this button to set the output I/O port to ON mode.
OFF. Click this button to set the output I/O port to OFF mode.
Page 22
18
Chapter 4
Advanced Viewing Setup
This Chapter provides information about the optional settings and features for viewing video via the FCS-3031/3051. This Chapter is for the Camera Administrator only.
Introduction
This chapter describes some additional settings and options for viewing live Video:
Adjusting the video image
Controlli ng user access to the live video stream
Making video available from the Internet
Using the Motion Detection feature
Adjusting the Video Image
If necessary, the Administrator can adjust the Video image.
To Adjust the Video Image:
1. Connect to the Web-based interface of the FCS-3031/3051. (See Chapter 5 - Web-based
Management for details.)
2. Select Administration, then Video & Audio. You will see a screen like the example below.
Figure 17: Video & Audio Screen
4
Page 23
19
3. Make the required adjustments, as explained below, and save your changes.
MPEG-4 Settings
Resolution
Select the desired video reso lution format. The de fault resolution is set to 320*240.
Video Quality Control
Constant Bit Rate: Select the desired bit rate. The default is set
to 256 Kbps.
Fixed Quality: Select the desired option. The default fix quality
is set to Normal.
Max. Frame Rate
Select the desired Maximum bandwidth for the video stream. Note that you can specify EITHER the Bandwidth OR the Frame Rate, not both. I f t he Bandwidth is defined, the frame rate will be adjusted as necessary to achieve the specified frame rate.
The default value for bandwidth is 30.
MJPEG Settings
Resolution
Select the desired video reso lution format. The de fault resolution is set to 320*240.
Fixed Video Quality
Select the desired fix quality. The default fix quality is set to Normal.
Max. Frame Rate
Select the desired Maximum bandwidth for the video stream. Note that you can specify EITHER the Bandwidth OR the Frame Rate, not both. I f t he Bandwidth is defined, the frame rate will be a djusted as necessary to achieve the specified frame rate.
The default value for bandwidth is 30.
Mobil Settings
Enable Mobil Streaming
Enable streaming video for the mobile device by checking this checkbox.
Resolution
The default resolution is set to 160x120.
Video Quality Control
Constant Bit Rate: Select the desired fix bit rate.
Fixed Quality: Select the desired option. The default fix quality
is set to Normal.
Max. Frame Rate
Select the desired Maximum bandwidth for the video stream.
Access Code
Enter the 8-digit code (0~9 ) for accessing the live video from camera through cell phone connection.
Video Adjustment
Power Line Frequency
Select the power line frequenc y (50Hz or 60Hz) used in your regio n, to improve the picture quality und er florescent lighting.
White Balance
Select the desired option to match the current environment and lighting.
Brightness
If necessary, you can adjust the brightness to obtain a better image. For example, if the camera is facing a bright light, the image may be too dark. In this case, you can increase the brightness.
Sharpness
Select the desired option for the sharpness. You can select a Sharpness value betwe en -3 and 3.
Page 24
20
Options
Microphone
Enable audi o by checking this c heckbox. Using Audio will increase the bandwidth requirements sl i ghtly.
Audio Type
Select the desired audio type.
Speaker
Enable speaker sound by checking this chec kbox.
Flip
This setti ng will have the image swa pped top-to-bottom.
Mirror
This setti ng will have the image swapped left-to-right.
Time Stamp
If enabled, the current time will be displayed on the Video image.
Text Display
Enable this setting if you want text to be displayed on the Video image, and enter the desired text - up to 20 characters. This feature is often used to identify each camera when multiple cameras are installed.
IR LEDs (FCS-3051 Only)
If the checkbox is enabl ed, the white light LEDs will be turned on when the lux is below 0.5 and Trigger Event opt ion in the e vent trigger screen is enabled.
Page 25
21
Viewing the live Video on your cel l phone
The live str eaming of t he FCS-3031/3051 can even be viewed from a compatible cell phone, so you can keep an eye on t hings almost everywhere you go. I t’s just as ea sy as following the required steps.
To Adjust the Mobile Settings
1. Connect to the Web-based interface of the FCS-3031/3051. (See Chapter 5 - Web-based
Management for details.)
2. Select Administration, then Video & Audio. You will see a screen like the example below.
Figure 18: Mobile Settings
3. Check the checkbox of Enable Mobile Stre aming and configure the related settings in the
Mobile Settings section, as ex plained below. Save your change s.
Mobil Settings
Enable Mobil Streaming
Enable streaming video for the mobile device by checking this checkbox.
Resolution
The default resolution is set to 160x120.
Video Quality Control
Constant Bit Rate: Select the desired fix bit rate.
Fixed Quality: Select the desired option. The default fix quality
is set to Normal.
Max. Frame Rate
Select the desired Maximum bandwidth for the video stream.
Access Code
Enter the code for accessing the live video from camera through cell phone connection.
Connecting Cell Phone to the FCS-3031/3051
A number of different mobile handsets are compatible with the FCS-3031/3051. Follow the suggested steps (steps may differ according to the mobile phone you use).
Before connecting to the cell phone, please make sure the following:
Mobile phone should be supported by 3GPP protocol.
Camera Web manageme nt - RT SP por t number in the Network screen needs to be entered.
Default is 554.
Page 26
22
Access code: 8 digits (0~9)
Steps :
1. Start IE
2. Select Add Bookmark
3. Click Edit
4. Enter desired value for Subject or leave it blank
5. Enter the camera’s IP address into the Address box.
RTSP://Internet_Address/Access_code
6. Click Play
Page 27
23
Controlling User Access to the Vi de o S t ream
By default, anyone can connect to the FCS-3031/3051 and view live Video at any time. If desired, you can limit access to scheduled times, and also restrict access to known users.
To Control User Access to Live Video:
1. Connect to the Web-based interface of the FCS-3031/3051. (See Chapter 5 - Web-based
Management for details.)
2. Select Administration, then V ideo Access.
3. Set the desired options for Access.
Access
If the Video Access is disabled, users cannot connect using either their Web Browser or the Windows utility. However, viewing video is still possible by logging in as the Administrator.
Figure 19: Controlling User Access
See Chapter 5 - Web-based Management for further details a bout using the Video Access and User Database screens.
Page 28
24
Making Video available from the Internet
If your LAN is connected to the Internet, typically by a Broadband Gateway/Router and Broadband modem, you can make the FCS-3031/3051 available via the Internet. You will need to configure your Router or Gateway to allow connections from the Internet to the camera.
Router/Gateway Setup
Your Router or Gateway must be configured to pass incoming TCP (HTTP) connections (from Internet Viewers) to the FCS-3031/3051. The Router/Gateway uses the Port Number to determine which inco ming connections are intended for the cameras.
This feature is normally called Port Forwarding or Virtual Servers, and is illustrated below. The Port Forwarding/Virtual Ser ver e ntry tells the Router/Gate way that incoming TCP connections on port 1024 should be passed to the FCS-3031/3051. If necessary, check the user manual for your Router/Gateway for further details.
Figure 20: Connecting via the Internet
The "Port" for the Port Forwardin g / Virtual Server entry above is the "Secondary Port" number specified on the Network screen of the FCS-3031/3051.
Page 29
25
Network Camera Setup
The configuration does NOT have be changed, unless:
You wish to change the port number from the default value (1024).
You wish to use the DDNS (Dynamic DNS) featur e of the FCS-3031/3051.
HTTP Port Configuration
Normally, HTTP (Web) connections use port 80. Since the FCS-3031/3051 uses HTTP, but port 80 is likely to be used by a Web Server, you can use a different port for the FCS­3031/3051. This port is called the Secondary Port.
The default Secondary Port is 1024. If you prefer to use a different port number, you can specify the port number on the camera's Network screen, as shown below.
Figure 21: Network Screen
See Chapter 5 - Web-based Management for further details on using the Network screen.
Viewers need to know this port number in or d er to connect and view live Video, so you must inform viewers of the correct port number.
Page 30
26
DDNS (Dynamic DNS)
Many internet connections use a "Dynamic IP address", where the Internet IP address is allocated whenever the Internet connection is established.
This means that other Internet users don't know the IP address, so can't establish a connection. DDNS is designed to solve this problem, by allowing users to connect to your LAN using a
domain name, rather than an IP address.
To use DDNS:
1. Register for the DDNS service with a supported DDNS service provider. You can then
apply for, and be allocated, a Domain Name.
2. Enter and save the correct DDNS settings on the DDNS screen of the FCS-3031/3051.
3. Both Router and Camera should use the same port number for DDNS service.
Figure 22: DDNS Screen
4. Operation is then automatic:
The FCS-3031/3051 will automatically contact the DDNS server whenever it detects
that the Inte rnet IP a ddress has changed, and inform the DDNS server of the new IP address.
Internet use rs can then connect to the camera using the Domain Name allocated by the
DDNS service provider. Example:
http://normanyu123456789.dyndns.org:6016
normanyu123456789.dyndns.org is domain host name. 6016 is the port number.
Page 31
27
Viewing Live Video via the Int e rnet
Clients (viewers) will also nee d a broadband connection; dial-up connections are NOT recommended.
Viewing Live Video Using your Web Browser
If using your Web browser, you need to know the Internet IP address (or the Domain name) of the camera's Router/Gateway, and the correct port number.
Enter the Internet address of the Router/Gateway, and its port number, in the Address (or Location) field of your Browser.
Example - IP ad dress:
HTTP://203.70.212.52:1024
Where the Router/Gateway's Internet IP address is 203.70.212.52 and the "Secondary Port" number on the FCS-3031/3051 is 1024.
Example - Domain Na me:
HTTP://mycamera.dyndns.tv:1024
Where the Router/Gateway's Domain name is mycamera.dyndns.tv and the "Secondary Port" number on the FCS-3031/3051 is 1024.
Page 32
28
Motion Detection Alerts
The Motion Detection feature can generate an Alert when motion is detected. The FCS-3031/3051 will compare consecutive frames to detect changes caused by the
movement of large objects. But the motion detector can also be triggered by:
Sudden changes in the l evel of available light
Movement of the camera itself.
Try to avoid these situations. The motion detection feature works b e st in loc a tions where there is good steady illumination, and the camera is mounted securely. It cannot be used outdoors due to the sensitivity of the CMOS sensor.
Note: The Motion Detectio n settings can only be c onfigured while using IE browser.
To Use Motion Detection Alerts
Using the W eb-based interface on the FCS-3031/3051, select the Motion Detection screen, then configure this screen as described below.
Figure 23: Motion Detection
1. Enable the Motion Detection feature.
2. Set the area or areas of the video image to be examined for moveme nt . You can d efine up
to 4 areas, and set the motion threshold individually for each area.
3. If using a schedule, define the desired schedule in Event Trigger screen.
4. Save your changes.
5. Select the E-Mail screen to have alerts sent by E-mail:
Enable and enter at least one (1) E-mail address
Select or enter the desired options for Video Attachment, Show "From" as and Subject
fields.
Enter details of the SMTP Server used to send the E-mail.
Page 33
29
If the Motion Detection feature is enabled, but E-Mail is not enabled, then the only action when motion is detected is to log this event in the system log.
Page 34
30
Chapter 5
Web-based Management
This Chapter provides Setup details of the FCS-3031/3051’s Web-based Interface. This Chapter is for the Camera Administrator only.
Introduction
The FCS-3031/3051 can be conf igured using your Web Browser. The FCS-3031/3051 must have an IP address which is compat ible with your PC.
The recommended method to ensure this is to use the supplied Windows-based Wizard, as described in Chapter 2 - Basic Setup.
Connecting to Network Camera
If using only your Web Browser, use the following procedure to establish a connection
from your PC to the FCS-3031/3051:
Once connected, you can add the FCS-3031/3051 to your Browser's Favorites or
Bookmarks.
Connecting using your Web Browser
1. Use the Camera Wizard to get the IP addr ess of the FCS-3031/3051.
2. Start your WEB browser.
3. In the Address box, enter "HTTP://" and the IP Address of the FCS-3031/3051.
4. You will then be prompted for a username and password.
If using the defaul t values, enter administrator for the name, and leave the
password blank.
Otherwise, enter the Administrator ID and Administrator Password set on t he
Maintenance screen.
5
Page 35
31
Welcome Screen
When you co nnect, the followin g s creen will be displayed.
Figure 24: Welcome Screen
The menu options available from this screen are:
View Video - View live Video using your Web Browser. See Chapter 3 - Viewing Live
Video for details.
Administration - Access the Administration menu.
English - Available languages for the user interface. Default is English.
Page 36
32
Administration Menu
Clicking on Administration on the menu provides access to all the settings for the FCS- 3031/3051.
The Administration menu contai ns the following options:
Setup
System
Network
DDNS
IP Filter
I/O Port
Video Stream
Video & Audio
Video Access
User Database
Event
Motion Detection
E-Mail
FTP
HTTP
SMB Client
Event Trigger
Administration
Maintenance
Status
Log
Page 37
33
System Screen
After clic king Administration on the main menu, or se lecting System on the Administration menu, you will see a screen like the example below.
Figure 25: System Screen
Data - System Screen
System Settings
Device ID
This displays the ID for the Net work Camera.
Camera Name
Enter the desired name for the Network Camera.
Description
This field is used for entering a description, such as the location of the Network Camera.
Date & Time
Date Format
Select the desired date format, it will also be used to display the date and time as a n overlay on the video image.
The abbreviations used to predefine the date formats are list as follows:
YYYY-MM-DD = Year-Month-Day, e.g. 2006-01-31
MM/DD/YYYY = Month/Day/Year, e.g. 01/31/2006
DD/MM/YYYY = Day/Month/Year, e.g. 31/01/2006
Current Date & Time
This displays the current date and time on the camera. If it's not correct, click the Change button to modify the date/time
settings. This button will open a sub-screen where you have 2 options:
Set the camera's date and time to match your PC.
Enter the correct date and time.
Page 38
34
Tim e Zone
Choose the Time Zone for your location from the drop-down list. If your location is curr ently using Daylight Saving, enable the Adjust
for daylight saving checkbox. You must UNCHECK this checkbox when Da ylight Saving
finishes.
Network Time Protocol
Enable or disable the Time Server feature as required. If Enabled, the FCS-3031/3051 will contact a Network Time Server at
regular intervals and update its internal timer.
NTP Server Address
Enter the address for the desired NTP server.
Update
The Schedule determines how often the Network Camera contacts the NTP Server. Select the desired options.
LED Operation
Enable this if you want to use this function.
Page 39
35
Network Screen
This screen is dis pl a ye d whe n t he Network menu option is clicked.
Figure 26: Network Screen
Data - Network Screen
Network
Internet Connection Type
There are 3 connection types:
Obtain Address Automatically (DHCP): If selected, the
FCS-3031/3051 will obtain its IP address and related information from a DHCP Server. O nly select this option if your LAN ha s a DHCP Serve r.
Static IP Address: If selected, you must assign the following
data to the FCS-3031/3051.
IP Address - Enter an unused IP address from the address
range used on your LAN.
Subnet Mask - Use the same value as PCs on your LAN.
Default Gateway - Use the same value as PC s on your
LAN.
PPPoE (PPP over Ethernet): This is the most co mmon login
method, widely used with DSL modems. Normally, your ISP will have provided some software to connect and login. This software is no longer required, and should not be used.
Username - The user name (or account name) provided by
your ISP.
Password - Enter the p assword for the logi n name above.
Page 40
36
Obtain DNS server address automatically
If selected, the FCS-3031/3051 will use the DNS address or addresses provided by the DHPC server. This option is only available if the I P address setting is Obtain an IP address Automatically.
Use the following DNS server address
Primary DNS server - Use the same value as PCs on your LAN.
Normally, your ISP will provide this address. Secondary DNS server - This is optional. If entered, this DNS will
be used if the Primary DNS does not respond.
Secondary Port
This sets the port number for HTTP (Web) connections to the Camera, whether for administr a tion or viewing video.
The secondary port can be used for DDNS, other service and when more than 2 cameras are in use.
If enabled, you can connect using either port 80 or the Secondary port. You must enter the Secondary port number (between 1024 to
65535) in the field provided. Note that when using a port number which is not 80, you must
specify the port number in the URL. For example, if the Camera's IP address was 192.168.1.100 and the Secondary port was 1024, you would specify the URL for the Camera as follows:
http://192.168.1.100:1024
RTP/RTSP
The RTSP (Real Time Streaming Protocol), a standard for connected client(s) to control streaming data (MPEG-4) over the World Wide Web. Enter the RTSP Port number (between 1024 and
65535) in the field provided. The default RTSP Port is 554. The RTP (Real Time Transport Protocol), an Internet protocol for
transmitting real-time data such as audio and video. Max RTP Data Packet field will let users limit the size of the file.
Enter the desired value between 400 and 1400. Note: RTSP and RTP settings are for Mobil phone only.
Multicast RTP/RTSP
Enable Multicast
Enable the feature as required.
Video Address
Enter the address of video.
Video Port
Enter the desired value (between 1024 to 65534) in the field provided. The number you entered must be even values.
Audio Address
Enter the address of the audio.
Audio Port
Enter the desired value (between 1024 to 65534) in the field provided. The number you entered must be even values.
Time to Live
Enter the desired length of time, if the packets fail to be delivered to their destination within. T he Time to Live you entered must be in-between 1 to 255.
UPnP
Enable Discovery
If enabled, the FCS-3031/3051 will broadcast its availability through UPnP. UPnP c ompatible systems suc h as Windows XP will then be able to detect the presence of the Network Camera.
Page 41
37
Enable Traversal
If enabled, HTTP, RTP and RTSP ports can be opened to establish and maintain TCP/IP network connections with the camer a that traverses r outers usi ng network address tr anslation (NAT).
QoS
Enable QoS Mode
If enabled, the throughput level (for Video and Audio) is guaranteed through QoS (Quality of Service).
DSCP
Enter the desired value of Differentiated Services Code Point (DSCP). The value must be between 0 and 63.
Page 42
38
DDNS Screen
Many Internet connections use a "Dynamic IP address", where the Internet IP address is allocated whenever the Internet connection is established.
This means that other Internet users don't know the IP address, so can't establish a connection. DDNS is designed to solve this problem, as follows:
You must register for the DDNS service with a DDNS service provider. The DDNS
Service provider will allocate a Domain Name to you upon request.
The DDNS settings on the DDNS screen above must be correct.
The FCS-3031/3051 will then contact the DDNS server whenever it detects that the
Internet IP address ha s changed, and inform the DDNS server of the new IP add ress. (The Check WAN IP Address determines how often the Network Camera checks if the Internet IP address has changed.)
This system allows other inter net users to connect to you using the Domain Name allocated by the DDNS service provider.
This screen is disp l a yed whe n t he DDNS menu option is clicked.
Figure 27: DDNS Screen
Data - DDNS Screen
DDNS
Enable DDNS
Enable or disable the DDNS function, as required. Only enable this feature if you have registered for the DDNS Service with a DDNS Server provider.
Service Provider
Choose a service provider from the list.
Web Site Button
Click this button to open a new wi ndow and co nnect to the Web site for the selected DDNS service provider.
Page 43
39
Domain (Host) Name
Enter the Domain Name (Host Name) allocated to you by the DDNS Server provider.
Account/E-Mail
Enter the login name for the DDNS account.
Password/Key
Enter the password for the DDNS account.
Check WAN IP Address
Set the schedule for che cking if t he Internet IP address has changed. If the IP address has changed, the DDNS Server will be notified.
NOTE: If the DDNS Service provided some software to perform this IP address update or notific a tion, you should NOT use this software. The update is performed by the camera.
Page 44
40
IP Filter
The IP Filter feature allows administrator to contro l FCS-3031/3051 access by filtering IP addresses. This screen is displayed when the IP Filter menu option is clicked.
Figure 28: IP Filter Screen
Data - IP Filter Screen
IP Filter
IP Filter
Select the desired method to perform the IP address (or addresses) filtering function.
Single/Range
Select to perform either single IP address or a range of IP addresses that you desired.
IP Address
Enter an IP address or a range of IP addresses you would like to allow or deny.
Page 45
41
I/O Port
The FCS-3031/3051 supports 1 input port and 1 output port. This screen is displayed when the I/O Port menu option is clicked.
Figure 29: I/O Port Screen
Data - I/O Port Screen
Input Ports
Current State
It indicates the current state of the input port. Once the configured state is happened, it will trigger the event actions.
Triggered When…
Select the desired State:
High
Low
Rising
Falling
Output Ports
Current State
It indicates the current state of the o utp ut port.
Default State
Select the desired option from the drop-down list.
Manual Trigger
Select the option to control the outp ut state.
Action When Triggered
If an event i s happened, i t will trigge r the event alerting.
Page 46
42
Video & Audio Screen
This scree n i s displayed when the Video & Audio menu option is clicked.
Figure 30: Video & Audio Screen
Data - Video & Audio Screen
MPEG-4 Settings
Resolution
Select the desired video reso lution format. The default resolution is set to 320*240.
Video Quality Control
Constant Bit Rate: Select the desired bit rate. The default is set
to 256 Kbps.
Fixed Quality: Select the desired option. The default fix quality
is set to Normal.
Max. Frame Rate
Select the desired Maximum bandwidth for the video stream. Note that you can specify EITHER the Bandwidth OR the Frame Rate, not both. If the Bandwidth is defi ned , the frame rate will be adj usted as necessary to achieve the specified frame rate.
The default value for bandwidth is 30.
MJPEG Settings
Resolution
Select the desired video reso lution format. The de fault resolution is set to 320*240.
Page 47
43
Fixed Video Quality
Select the desired fix quality. The default fix quality is set to Normal.
Max. Frame Rate
Select the desired Maximum bandwidth for the video stream. Note that you can specify EITHER the Bandwidth OR the Frame Rate, not both. If the Bandwidth is defi ned , the frame rate will be adj usted as necessary to achieve the specified frame rate.
The default value for bandwidth is 30.
Mobil Settings
Enable Mobil Streaming
Enable streaming video for the mobile device by checking this checkbox.
Resolution
The default resolution is set to 160x120.
Video Quality Control
Constant Bit Rate: Select the desired fix bit rate.
Fixed Quality: Select the desired option. The default fix quality
is set to Normal.
Max. Frame Rate
Select the desired Maximum bandwidth for the video stream.
Access Code
Enter the 8-digit code (0~9 ) for accessing the live video from camera through cell phone connection.
Video Adjustment
Power Line Frequency
Select the power line frequenc y (50Hz or 60Hz) used in your regio n, to improve the picture quality under florescent lighting.
White Balance
Select the desired option to match the current environment and lighting.
Brightness
If necessary, you can adjust the brightness to obtain a better image. For example, if the camera is facing a bright light, the image may be too dark. In this case, you can increase the brightness.
Sharpness
Select the desired option for the sharpness. You can select a Sharpness value betwe en -3 and 3.
Options
Microphone
Enable audi o by checking this c heckbox. Us ing Audio will increase the bandwidth requirements sl i ghtly.
Audio Type
Select the desired audio type.
Speaker
Enable speaker sound by checking this chec kbox.
Flip
This setti ng will have the image swa pped top-to-bottom.
Mirror
This setti ng will have the image swa pped left-to-right.
Time Stamp
If enabled, the current time will be displayed on the Video image.
Text Display
Enable this setting if you want text to be displayed on the Video image, and enter the desired text - up to 20 characters. This feature is often used to identify each camera when multiple cameras are installed.
IR LEDs (FCS-3051 Only)
If the chec kbox is enabled, the IR LEDs will be turned on when the lux is below 0.5 and Trigger Event option in t he event trigger screen is enabled.
Page 48
44
Day/Night Switch
Switching Method
Select the desired method from the list.
Page 49
45
Video Access Screen
This screen is displayed whe n the Video Access option on the Video & Audio menu is clicked.
Figure 31: Video Access Screen
Data - Video Access Screen
User Access
Enable Security Checking
If disabled (default) - No login required. Users do not have to
provide a username and password when they connect to the camera for viewing video.
If enabled - Require login. Users will be prompted for a
username and password when they connect to the camera for viewing video. The camera administrator must use the "User Database" menu option to create the desired users.
Video Access
Enable Scheduled Video Access
If enabled - Viewing v ideo is avail able during the scheduled
periods, and unavailable at other times. If this option is selected, you need to define a sc hedule. If no schedule i s defined, this option is always disabled.
If disabled - The optio n will remain disabled until you enable it. Note that regardless of which setting is chosen, the Administrator
can ALWAYS access the camera and view live video.
Access Schedule
Scheduled Periods
This displays all periods you have entered into the database. If you have not entered any periods, this li st will be empty.
Delete
Use the Delete button to delete the selec te d item in the list.
Page 50
46
Add New Schedule
Day
Choose the desired option for the period.
Start Time
Enter the start time using a 24 hr clo c k.
End Time
Enter the e nd time using a 24 hr clock.
Add
Click this button to add a new period.
Clear
Use this button to clear the input field s.
Page 51
47
User Database Screen
This scree n i s displayed when the User Database option is clicked.
Figure 32: User Database Screen
Data - User Database Screen
Existing Users
User List
This displays all users you have entered into the User database. If you have not entered any users, this list wi ll be empty. The maximum number of users is 20.
Edit, Delete, Delete All
Use these buttons to manage the user database.
User Properties
User Name
Enter the name for the user here.
Spaces, punctuation, and special characters must NOT be used
in the name.
The name is case insensitive (case is ignored), so you can not
have 2 name s which differ only by cas e.
User Password
The password for this user.
Confirm Password
Re-enter the password for the user, to ensure it is correct.
Control Level
Select either Viewer or Operator for the user you plan to add.
Add Button
Click this button to add a new user, using the data shown on screen.
Clear Button
Use this button to clear the input field s, ready to add a new user.
Page 52
48
Motion Detection Screen
This scree n i s displayed when the Mo tion Detection option on the Event menu is clicked.
Figure 33: Motion Detection Screen
Data - Motion Detection Screen
Motion Detection
Set Detection Areas
You can set the full screen or selected areas of the video image to be examined.
Note: Motion detection can be triggered by rapid changes in lighting condition, a s well as by moving objects. For t his reason, it should only be used indoors.
Indicator/Threshold
Administrator needs to adjust the relation between indicator and threshold for each area.
Page 53
49
E-Mail Screen
This scree n i s displayed when the E-Mail option on the Event menu is clicked.
Figure 34: E-Mail Screen
Data - E-Mail Screen
Primary/Secondary SMTP Server
SMTP Server Address
Enter the address and port number of the SMTP (Simple Mail Transport Protocol) Server to be used to send E-Mail.
Authentication
Select the desired Authentication type for the SMTP Server.
SMTP Login name
Enter your login name for the SMTP Server.
SMTP Password
Enter your password for the SMTP Server.
POP server name
Enter the name for the POP Server.
Show "From" as
Enter the E -Mail address to be shown in the "From" field when the E-Mail is received.
Secondary SMTP
Check the box to upload to the Secondary SMTP if the camera cannot connect to the primary SMTP.
Page 54
50
E-Mail Setup
E-mail Address
Enter at least one (1) E-Mail address; the 2nd and 3rd addresses are optional. The E-Mail alert will be sent to the E-Mail address or addresses specified here.
Subject
Enter the desired text to be shown as the "Subject" for the E-Mail when it is received. Subject can not exceed 48 alphanumeric characters.
Page 55
51
FTP Screen
This scree n i s displayed when the FTP option on the Event menu is clicked.
Figure 35: FTP Screen
Data - FTP Screen
Primary/Secondary FTP
FTP Server
Enter the address of the FTP Server.
Port
Enter the Port of the FTP Server to be connected.
Login name
Enter your login name for the FTP Server.
Password
Enter your password for the FTP Server.
Enable Passive Mode
Check the box to enable the Passive mode feature of the FTP.
File Path Name
Enter the file path/name of the FTP.
Secondary FTP
Check the box to upload to the Secondary FTP if the camera cannot connect to the primary FTP.
Page 56
52
HTTP Screen
This scree n i s displayed when the HTTP option on the Event menu is clicked.
Figure 36: HTTP Screen
Data - HTTP Screen
HTTP Notification
URL
Enter the U RL of your HTTP notification server .
User Name
Enter the user name of the HTTP server.
Password
Enter the password of the HTTP server.
Proxy Server Name
Specify the proxy server name in the provided field if the camera needs to pass through a Proxy Server to do the HTTP notification.
Proxy User Name
Enter the user name for the proxy server.
Proxy Password
Enter the password for the proxy server.
Port Number
Enter the port number for the proxy server.
Method
Select the desired method of form data encoding.
Get - It should be used if and only if the form processing is
independent, which typically means a pure query form. Generally it is advisable to do so.
Post - If there are problems related to long URLs and non-ASCII
character repertoires, which can make it necessary to use "POST" even for independent processing.
Page 57
53
SMB Cli ent Screen
This scree n i s displayed when the S MB Client option on the Event menu is clicked.
Figure 37: SMB Client Screen
Data - SMB Client Screen
SMB Client
SMB Client
Enable this checkbox to use the SMB Protocol, which is a client server, request-response protocol used for read, create, and update files on the remote server.
File Path
Enter the file path of your SMB server.
User Name
Enter the use r name for the SMB client account.
Password
Enter the password for the SMB client account.
Page 58
54
Event Trigger Screen
This scree n i s displayed when the Event Trigger option on the Event menu is clicked.
Figure 38: Event Trigger Screen
Data - Event Trigger Screen
Event Schedule
Schedule List
The Event Schedule shows all o f t he event typ es currently configure d in the FCS-3031/3051.
Delete Button
Click this button to delete the selec te d schedule in the list above.
New Schedule
Effective Time Frame
Choose the desired option for the period.
Start Time
Choose the desired start time using a 24 hr clock.
End Time
Choose the desired end time using a 24 hr clock.
Trigger Event
Trigger Event
Check to perform all of the event(s) that were configured and scheduled.
Interval
Select the desired option for the events interval. (* "0" = No Delay)
Page 59
55
Trigger by
Input - This de scribes the states that the input must be in for an
event to be triggered. Only one input can be used, also note that the states for the input used must first be reached before the event will be triggered.
PIR - If the PIR sensor de te c ts a human body, it will be used to
trigger eve nts.
Motion Detection - Movement in a motion detection window
can be used to trigger events.
Actions
E-Mail - If checked, an E-Mail (with "Attachment") will be
delivered to the SMTP server. (SMTP Server must be configure d on the E-Mail page.)
FTP - If checked, an FTP upload will be activated to the FTP
server. (FTP servers must be configured o n the FTP page.)
Output Port - If checked, the output port state will be activated
as configured. (Output port must first be configured on the I/O Port page.)
HTTP - If checked, an Instant Messaging (IM) will be delivered
to the Jabber server. (Jabber server must be configured on the Instant Messaging pa ge.)
SMB - If checked, JP EG image(s) or video files will be
uploaded to the SMB server. (SMB must first be enabled and configure d on the SMB Cl ient page .)
Attachment Type
JPEG Image:
Frame Rate - Select the desired capture rate (1~5) for the JPEG image(s) here. Pre/Post Capture - Select the desired length. The snapshot(s) of the JPEG image depends on this setting, and also the file size and degree of compression.
Video:
Video Format - Select the desired type for the video file. Pre/Post Capture - Select the desired length. The size of the file depends on this setting, and also the Video size and degree of compression.
Note: The total length of Pre/P ost Capture is 5 seconds that is limited by the flash size.
Page 60
56
Maintenance Screen
Figure 39: Maintenance Screen
Data - Maintenance Screen
Administrator Login
Administrator ID
Enter the name for the Administrator here. Spaces, punctuation, and special characters must NOT be used in the
name.
Administrator Password
The password for the Administrator.
Verify Password
Re-enter the password for the Administrator, to ensure it is correct.
Firmware Upgrade
Upgrade File
Click the "Browse" button and browse to the location on your PC where you stored the Firmware file. Select this file.
Start
Click this button to start the Firmware. When the upgrade is finis hed, the FCS-3031/3051 will restart, and this manage ment connection will be unavaila ble during the resta rt.
Clear File Name
This does NOT stop the Upgrade process if it has started. It only clears the input for the "Upgrade File" field.
Page 61
57
Backup & Restore
Backup Configuration File
Click Backup button to save the current c onfiguration information to a text file. It is suggested to backup the configuration file, in order to restore the camera easily.
Restore Configuration File
Click Restore butto n to reinitialize the camera to load the new updated software. Do this after loading the upgrade file.
Clear File Name
This does NOT stop the R estore process if it has started. It only clears the input for the "Restore Confi guration File" field.
Restore Factory Defaults
Click Defaults button to reloads all default settings on the camera.
Restart Camera
Click Restart butto n to restarts the camera.
Page 62
58
Status Screen
Figure 40: Status Screen
Data - Status Screen
System
Device Name
This shows the name of the Network C amera.
Description
This shows the description of the Network Camera, such as location.
F/W version
The version of the current firmware installed.
Network
MAC Address
The current IP address of the Network Camera.
IP Address
The IP Address of the Network Camera.
Network Mask
The network mask associated with the IP address above.
Gateway
The IP Address of the remote Gateway associated with the IP Address above.
MPEG-4/MJPEG
Resolution
The image size of the video stream.
Video Quality
This displ ays the image quality o f the video st ream.
Frame Rate
This displays the frame rate of the video stream.
Page 63
59
Buttons
Refresh
Update the log and any other data on screen.
Page 64
60
Log Screen
This screen displays a log of system activity.
Figure 41: Log Screen
Data - Log Screen
Log
System Log
This is a log of system activity.
Refresh Button
Click this button to update the data shown on screen.
Clear Log
Click this button to restart the lo g.
Enable Syslog Service
Check the box to enable the System Log Server feature.
Syslog Server Address
Enter the address of the Syslog Server.
Page 65
61
Chapter 7
Troubleshooting
This chapter covers the most likely problems and their solutions.
Overview
This chapter covers some common problems that may be encountered while using the FCS­3031/3051 and some possible solutions to them. If you follow the suggested steps and the Network Camera still does not function properly, contact your dealer for further advice.
Problems
Problem 1: I can't connect to the FCS-3031/3051 with my Web Browser to
configure it.
Solution 1:
It is possible that your PC's IP address is not compatible with the IP address of the FCS-3031/3051. Use the Camera Wizard to configur e the FCS-3031/3051 with a valid IP address.
Problem 2: The Camera Wizard doesn't list any Network Cameras. Solution 2:
Check the fo l lowing:
The FCS-3031/3051 is installed, LAN connections are OK, it is
powered ON and startup is complete.
Ensure that your PC and the FCS-3031/3051 are on the same network
segment. ( If you don't have a router, this must be the case.)
Ensure that your PC has t he TCP/IP network protocol loaded. In
Windows, this is done by using Control Panel-Network.
If an entry for TCP/IP -> Network card is not listed, use Add -
Protocol - Microsoft - TCP/IP to add it.
You the n need to sele ct the new entry (TCP/IP -> Network card),
click Properties, and configure the IP Address tab.
If your LAN has a DHCP Server, you can select "Obtain an IP
Address automatically". Otherwise, you must select "Specify an IP Address", and enter values for IP Address, Subnet Mask, and Gateway. All devices on your LAN mus t use compatible values. Remember that each device needs a unique IP Address, and the same Subnet Mask.
Problem 3 When I try to connect to the FCS-3031/3051, I get prompted for a user
name and password.
Solution 3
You SHOULD be prompted for a user name and password if trying to access the Administration menu. Enter the Administrator ID and Password set on the Maintenance screen.
If you are just trying to view Video, the User Name/Password prompt
7
Page 66
62
indicates that the Administrator has restricted access to specified users.
Ask the Administrator for your User Name and Password.
Problem 4 Video quality may suddenly deteriorate.
Solution 4
This can happen when an additional viewer connects to the FCS­3031/3051, overloading the camera or the available bandwidth. The image size and quality can be adjusted to cater for the required number of viewers and the available bandwidth.
Problem 5
The motion detection feature doesn't send me any E-Mails.
Solution 5
It may be that the SMTP (Simple Mail Transport Protocol) server used by the camera to send the E-Mail will not accept mail. (This is to prevent span being sent from the server.). Try using a different SMTP server, or contact your ISP to see if SMTP access is being blocked.
Problem 6
Using the motion detection feature, I receive E-Mails which don't show any moving objects.
Solution 6
The motion detection feature doesn't actually detect motion. It compares frames to see if they are different. Major differences between frames are assumed to be caused by moving objects.
But the motion detector can also be triggered by:
Sudden changes in the l evel of available light
Movement of the camera itself.
Try to avoid these situations. The motion detection feature works b e st in locations where there is good stea dy illumination, and the camera is mounted securely. This feature can NOT be used if the camera is outdoors.
Problem 7
The image is blurry.
Solution 7
Try cleani ng the lens, or adjusting the Video Quality Control setting on the Video & Audio screen. Video created will the lower settings will co ntain less detail; this is the trade-off for using less bandwidth.
Page 67
63
Appendix A
Specifications
FCS-3031/3051
Model FCS-3031/3051
Dimensions 145mm (D) * 102mm (H) Light Sensor
(FCS-3051 Only)
Min low lux trigger value: 0.5 lux
PIR Sensor Sensitivity distance: 5 meters
Angle degree: 75°(cone)
Focus distance: 6~9 meters LAN 10/100BaseT, Auto-MDIX Image Sensor Omni Vision OV7725 CMOS Sensor Board Mount Lens FCS-3031: 4.57mm, F2.0 Fixed Focus lens
FCS-3051: 3.3mm~12mm, F1.4~2.9 Vari-Focal Operating Temperature
0° C to 40° C Storage Temperature
0° C to 40° C Network Protocols TCP/IP, DHCP, SMTP, NTP, HTTP, FTP, RTP, RTSP, UPnP
(Discovery/Traversal) Connector Ethernet, RJ45 connector
Digital Input, Mini dim x1
Digital Output, Mini dim x1
Reset Button, Tack switch
Microphone In, 3.5mm Phone Jack LEDs Ready (green)
Active (green)
Network (green) Power Adapter 12V/1A DC External
A
Page 68
64
Regulatory Approvals
CE Approvals
The FCS-3031/3051 meet the guidelines of the European Union and comply with the 99/5/EEC and RTTE 99/5EG directives, including the following sta nd ar d s:
EN60950
EN300 328-2
EN301 489-1
EN301 489-17
This is a Class B product. In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures.
Page 69
65
Copyright Notice
Many software components are covered by the GNU GPL (General Public License). Some are covered by other Licenses as listed in the table below.
Details of each applicable license are contained in the following section.
No Warranty
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR P URPOSE ARE DISCLAIMED. IN NO EVE NT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS O F USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
FCS-3031/3051 copyright information
Package source codes License
bootloader GPL arm-linux 2.6.5
GPL
arm-linux-gcc 3.4.1 library
LGPL
DM9000 lan driver
GPL
Busy-box
GPL
boa-0.94.13a
GPL
ez-ipupdate GPL dhcpd-1.3.22
GPL
boa-0.94-13e11
GPL
WPA_supplicant
GPL
cron Public domain (BSD & Lineo
http://www.lineo.com/)
ntp-4.1.71
Public domain
(http://www.ntp.org/)
libupnp-1.2.1
Intel
(http://upnp.sourceforge.net/)
Page 70
66
ntp-4.1.71 license
Copyright (c) David L. Mills 1992-2001
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appears in all copies and that both the copyright notice and this permission notice appear in supporting documentation, and that the name University of Delaware not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. The University of Delaware makes no representations about the suitability this so ftware for any purpose. It is provided "as is" without express or implied warranty.
Libupnp-1.2.1 License
Copyright (c) 2000 Intel Corporation. All rights reserved.
Redistribution and use in sourc e and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source co de must retain the above cop yright notic e , this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither name of Intel Corporation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL INTEL OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY T HE ORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR T ORT (I NCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Page 71
67
cron license
Copyright (c) 1989 The Regents of the University of California. All rights reserved. This code is derived from software co ntributed to Berkeley by Paul Vixie. Redistribution and use in source and binary forms are permitted provided that the above
copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising m a te rials, and other materials relate d to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED ''AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, T HE IMPLIED W ARRANT IES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Page 72
68
GNU General Public License
GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but
changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get itif you want it, that you can change the software or use pieces of it in new free programs; and that you know yo u can do these things.
To protect your rights, we need to make re str ic tions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions transla te to certain responsibilities for you if you distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you mu st show them these ter ms so they know their ri ghts.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually o btain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
GNU GENERAL PUBLIC LICENSE Terms And Conditions For Copying, Distribution And Modification
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this Gener a l Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or
Page 73
69
translated into anot her language. (Hereinafter, translation is included without limitation i n the term "modification".) Each licensee is addressed as "you".
Activities other than copying, distribution and modification a re not covered by this License; they are outside its scope. The act of running the Program is not restrict ed, and the output from the Program is covered only if its contents constitute a work based on the Program (independ ent of having been made by runnin g the Program). Whethe r that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the a bsence of any warra nty; and give any other recipients of the Pr ogram a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause it, when started running for suc h in te ractive use in the most ordinary way, to print or display an announcement including an appropria t e copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling th e user how to view a copy of this License. (Excep tion: if the Program it s elf is inter active but does not normally print such an announcement, your work based on the Program is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to c la im rights or contest your rights to work written entirely b y you; rather , the intent is to exercise the right to control the distribution o f de r ivative or collective works based on the Program.
In addition, mere aggr egation of another wo rk not base d on the Program with the Progra m (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the fo l lowing:
a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,
Page 74
70
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,
c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated i nter face definition files, plus the scrip ts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include a nything that is normally distrib uted (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, un less that component i t s elf accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will auto matica lly terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such p a rties remain in full compliance.
5. You are not require d to accept this License, since yo u have not signed it. However, nothing else grants you permission to mod if y o r distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a licen se from the original licensor to c opy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restri ctions on the recipients' exercise of the rights granted herein.You are not responsible for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that c ontradict t he conditions of this License, they do not excuse you from the conditions of this License. I f yo u cannot distribute so as to satisfy si multa neously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free r e distribution of the Program by all those who receive copies directly or indirectly through you, then the o nly way yo u could sati s fy both it a nd this License would b e to refrain entirely from distribution of the Program.
If any portion of this section is held in valid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is i mple mented by public license
Page 75
71
practices. Many people have made generous contributions to the wide range of software distributed through that syste m in reliance on consistent applica tion of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
8. If the distribution and/or use o f the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explic it geographical distributio n limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new ve rsions of t he General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing versi on number. If the P rogram specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of an y later vers ion published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever pub lished b y the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" W ITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALIT Y AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEE N ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Page 76
72
END OF TERMS AND CONDITIONS
Page 77
73
Lesser GNU General Public License
GNU LESSER GENERAL PUBLIC LI CENSE
Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but
changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the
GNU Library Public License, version 2, hence the version number 2.1.]
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.
This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case, based on the explanations below.
When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free programs; and that you are informed that you can do these things.
To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these r ights. These restrictions translate to c e rtain responsibilities for you if you distribute copies of the library or if you modify it.
For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so t hey know thei r rights.
We protect your rights with a two -step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal p e rmission to copy, distribute and/or modify the library.
To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others.
Page 78
74
Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be co nsistent with the full freedom of use sp e c ified in this license.
Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs.
When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with t he library.
We call this license the "Lesser" General Public License because it does Less to protect the user's freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances.
For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License.
In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.
Although the Lesser General Public License i s Less protective of the users' freedom, it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library.
The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, whereas the latter must be combined with the lib rary in order to run.
GNU LESSER GENERAL PUBLIC LI CENSE TERMS AND CONDITIONS FOR COPYI NG, DISTRIBUTION AND
MODIFICATION
0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License"). Each licensee is addressed as "you".
A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables.
Page 79
75
The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Libra ry or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the te rm "modification".)
"Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated inte r face definition files, plus the scrip ts u sed to control compilation and installation of the library.
Activities other than copying, distribution and modification a re not covered by this License; they are outside its scope. The act of running a program using the Library is no t restricted, and output from such a program is co vered only if its contents constitut e a work based on the Library (independent of the us e of the Library in a tool for writing it). Whether that is true depends o n what the Lib r ary does and what the program that uses the Library does.
1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Lib ra r y.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:
a) The modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the
files and the date of any change. c) You must cause the whole of the work to be licensed at no charge to all third parties under
the terms of this License. d) If a facility in the modified Library refers to a function or a table of data to be supplied by an
application program that uses the facility, other than as an ar gument passe d when the facilit y is invoked, then you must make a good faith effo rt to ensure that, in the event an a pplication does not supply such function or tab le , the facility still operates, and performs whatever part of its purpose remains meaningful.
(For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute t hem as separate works. But when yo u distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to c la im rights or contest your rights to work written entirely by you; rather, the intent is to exerc ise the right to control the distrib ution of derivative or collective works based on the Library.
Page 80
76
In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the o rdinary GNU General Public License, version 2, instead of to this License. (If a newer versi on than vers ion 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices.
Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy.
This option is useful when you wish to copy part of the code of the Library into a program that is not a library.
4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange.
If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code.
5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compile d or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefor e falls outside the scope of this License.
However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License. Section 6 states terms for distr ibution of such executables.
When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a libr a r y. The threshold for this to be true is not pre c isely defined by law.
If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall u nd e r Section 6.)
Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms o f Section 6. Any executables conta ining that work also fall under Section 6, whether or not they a re linked directly with the Libr a r y itself.
Page 81
77
6. As an exception to the Sections above, you may also combine or l i nk a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications.
You must gi ve prominent notice with each co py of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work dur ing execut ion displays copyrig ht notices , you must i nclude the copyright notice for the Librar y among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things:
a) Accompany the work with the complete corresponding machine-readable source code for the Library inc luding whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to rec ompile the application to use the modified definitions.)
b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user's computer system, rather than copying lib rary functions into the executable, and (2) will operate properly with a modi fi ed versio n of the lib rary, if the user installs one, as long as the mod ified version is interface-compatible with the version that the work was made with.
c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution.
d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place.
e) Verify that the user has already received a copy of these materials or that you have already sent this user a copy.
For an executable, the required form of the "wor k that uses the Library" must incl ude any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anythi ng that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
It may happen that this requirement contradicts the license re stric tions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you dis tribute.
7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other libr a ry facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and pro vided that you do these two things:
a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other libr a ry facilities. This must be distributed under the terms of the Sections above.
b) Give prominent notice with the combined library of the fact that par t of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.
Page 82
78
8. You may not copy, modify, sublicense, link with, or distribute the Library except a s expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatica lly terminate your rights under this License. However, parties who have received copies , or rights, from you under this License will not have their licenses terminated so long as such par tie s r emain in full compliance.
9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to mod if y o r distribute the Library or its derivati ve works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Librar y), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it.
10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a licen se from the original licensor to c opy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License.
11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or other wise ) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obli gatio ns, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is imple mented by public license practices. Many people have made generous contributions to the wide range of software distributed through that syste m in reliance on consistent applic a tion of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
12. If the distribution and/or use of the Library is restricted in certain cou ntries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geograp hical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.
13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from ti me to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing versi on number. If the Library specifies a versi on number of this License which applies to it and "any later version", you have the o ption of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever publ i s hed by the Free Softwa re Foundat ion.
Page 83
79
14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.
NO WARRANTY
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BU T NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALIT Y AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
Page 84
80
Appendix B
Streaming Video/Audio
Solution
Overview
Streaming video is a sequence of "moving images" that are sent in compressed form over the Internet and displayed by the viewer as they arrive. With streaming, a Web user does not have to wait to download a large file before seeing the video or hearing the sound. Instead, the media is sent in a c ontinuous stream and is played as it arrives.
Streaming Video/Audio through Internet Camera
To snapshot a JPEG image from the FCS-3031/FCS-351 with specified resolution and quality:
http://<ip>/img/snapshot.cgi?[size=<value>][&quality=<value>]
Size = 1(160*128) 2(320*240) 3(640*480) Quality = 1(Very high) 2(high) 3(Normal) 4(low) 5(Very low)
To stream M-JPEG video from the Internet Camera (M-JPEG mode only)
http://<ip>/img/mjpeg.cgi or http://<ip>/img/mjpeg.ht m
To stream video through the RTP/RTSP protocol from Internet Camera (MPEG-4 mode only) rtsp://<ip>/img/media.sav Note: Users need to specify the desired protocol in the players.
To snapshot a JPEG image (160*128, very low quality) thr ough a mobi le phone:
http://<ip>/img/mobile.cgi
B
Loading...